• Title/Summary/Keyword: Internet Speed

Search Result 1,571, Processing Time 0.023 seconds

Federated learning-based client training acceleration method for personalized digital twins (개인화 디지털 트윈을 위한 연합학습 기반 클라이언트 훈련 가속 방식)

  • YoungHwan Jeong;Won-gi Choi;Hyoseon Kye;JeeHyeong Kim;Min-hwan Song;Sang-shin Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.23-37
    • /
    • 2024
  • Digital twin is an M&S (Modeling and Simulation) technology designed to solve or optimize problems in the real world by replicating physical objects in the real world as virtual objects in the digital world and predicting phenomena that may occur in the future through simulation. Digital twins have been elaborately designed and utilized based on data collected to achieve specific purposes in large-scale environments such as cities and industrial facilities. In order to apply this digital twin technology to real life and expand it into user-customized service technology, practical but sensitive issues such as personal information protection and personalization of simulations must be resolved. To solve this problem, this paper proposes a federated learning-based accelerated client training method (FACTS) for personalized digital twins. The basic approach is to use a cluster-driven federated learning training procedure to protect personal information while simultaneously selecting a training model similar to the user and training it adaptively. As a result of experiments under various statistically heterogeneous conditions, FACTS was found to be superior to the existing FL method in terms of training speed and resource efficiency.

An Efficient Dual Queue Strategy for Improving Storage System Response Times (저장시스템의 응답 시간 개선을 위한 효율적인 이중 큐 전략)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • Recent advances in large-scale data processing technologies such as big data, cloud computing, and artificial intelligence have increased the demand for high-performance storage devices in data centers and enterprise environments. In particular, the fast data response speed of storage devices is a key factor that determines the overall system performance. Solid state drives (SSDs) based on the Non-Volatile Memory Express (NVMe) interface are gaining traction, but new bottlenecks are emerging in the process of handling large data input and output requests from multiple hosts simultaneously. SSDs typically process host requests by sequentially stacking them in an internal queue. When long transfer length requests are processed first, shorter requests wait longer, increasing the average response time. To solve this problem, data transfer timeout and data partitioning methods have been proposed, but they do not provide a fundamental solution. In this paper, we propose a dual queue based scheduling scheme (DQBS), which manages the data transfer order based on the request order in one queue and the transfer length in the other queue. Then, the request time and transmission length are comprehensively considered to determine the efficient data transmission order. This enables the balanced processing of long and short requests, thus reducing the overall average response time. The simulation results show that the proposed method outperforms the existing sequential processing method. This study presents a scheduling technique that maximizes data transfer efficiency in a high-performance SSD environment, which is expected to contribute to the development of next-generation high-performance storage systems

An Improvement of Speed for Wavelength Multiplex Optical Network using Optical Micro Electro Mechanical Switches (광마이크로전자기계 스위치를 이용한 파장다중 광네트워크의 속도 재선)

  • Lee Sang-Wha;Song Hae-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.123-132
    • /
    • 2005
  • In this Paper, we present an improvement of switch node for wavelength multiplex optical network. Currently because of quick increase of internet traffic a big network capacity is demanded. Wavelength multiplex optical network Provides the data transfer of high speed and the transparent characteristic of the data. Therefore optic network configuration is the most powerful technology in the future. It will be able to control the massive traffic from the optical network in order to transmit the multimedia information of very many quantify. Consequently the node where the traffic control is Possible, is demanded. The optical switch node which manages efficiently the multiple wavelength was Proposed. This switch is composed of a optical switch module for switching and a wavelength converter module for wavelength conversion. It will be able to compose the switch fabric without optical/electro or electro/optical conversion using optical MEMS(Micro Electro Mechanical Switches) module. Finally, we present the good test result regarding the operational qualify of the switch fabric and the performance of optical signal from the switch node. The proposed switch node of the optic network will be able to control the massive traffic with all optical.

  • PDF

Study of DRM Application for the Portable Digital Audio Device (휴대용 디지털 오디오 기기에서의 DRM 적용에 관한 연구)

  • Cho, Nam-Kyu;Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.21-27
    • /
    • 2006
  • With the introduction of sound source sharing over the high speed internet and portable digital audio, the digitalization of sound source has been rapidly expanded and the sales and distribution of sound sources of the former offline markets are stagnant. Also, the problem of infringement of copyright is being issued seriously through illegal reproduction and distribution of digitalized sound sources. To solve these problems, the DRM technology for protecting contents and copyrights in portable digital audio device began to be introduced. However, since the existing DRM was designed based on the fast processing CPU and network environment, there were many problems in directly applying to the devices with small screen resolution, low processing speed and network function such as digital portable audio devices which the contents are downloadable through the PC. In this study, the DRM structural model which maintains similar security level as PC environment in the limited hardware conditions such as portable digital audio devices is proposed and analyzed. The proposed model chose portable digital audio exclusive device as a target platform which showed much better result in the aspect of security and usability compared to the DRM structure of exiting portable digital audio device.

  • PDF

A Study of Modified Parallel Feistel Structure of Data Speed-up DES (DES의 데이터 처리속도 향상을 위한 변형된 병렬 Feistel 구조에 관한 연구)

  • Lee, Seon-Keun;kIM, Hyeoung-Kyun;Kim, Hwan-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.12
    • /
    • pp.91-97
    • /
    • 2000
  • With the brilliant development of information communication and the rapid spread of internet, current network communication is carrying several up-to-date functions such as electronic commerce, activation of electro currency or electronic signature and will produce more advanced services in the future. Information communication network such as that electronic commerce would demand the more safe and transparent guard of network, and anticipate the more fast performance of network. In this paper, in order to meet the several demands, DES(data encryption standard) with parallel feistel structure, which feistel structure of the basic structure of DES is transformed into in parallel, is proposed. The existing feistel structure can't use pipeline method for the structural problem of DES itself-the propagation of error. therefore, this modified parallel feistel structure could improve largely the performance of DES which had to have the trade-off relation between data processing speed and data security and in addition a method proposed in SEED having adopted the modified parallel feistel structure shows more excellent secure function and/or fast processing ability. The used CAD Tool use Synopsys Ver. 1999. 10 in both of synthesis and simulation.

  • PDF

Long-term Monitoring System for Ship's Engine Performance Analysis Based on the Web (선박엔진성능분석용 웹기반 장기모니터링시스템 구현)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Kim, Min-Kwon;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.483-488
    • /
    • 2015
  • This paper implements a long-term monitoring system (LMS) for ship's engine performance analysis (SEPA) based on the web, for the purpose of the communication speed and engine maintenance. This system is composed of a simulator, monitoring module with a multi channel A/D converter, monitoring computer, network attached storage (NAS), RS485 serial and wireless internet communication system. The existing products monitor the information transmitted from pressure sensors installed in the upper parts of each of engines in the local or web computer, but have a delay in the communication speed and errors in long-term monitoring due to the large volume of sampling pressure data. To improve these problems, the monitoring computer saves the sampling pressure data received from the pressure sensors in NAS, monitors the long-term sampling data generated by the sectional down sampling method on a local computer, and transmits them to the web for long-term monitoring. Because this method has one tenth of the original sampling data, it will use memory with small capacity, save communication cost, monitor the long-term sampling data for 30 days, and as a result, make a great contribution to engine maintenance.

Factors Affecting the Continuous Use of Mobile Music Contents (모바일 음악콘텐츠의 지속적 사용에 영향을 미치는 요인에 관한 연구)

  • Yang, Seung-Kyu;Park, Seong-Won;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.291-305
    • /
    • 2008
  • Previous study about Mobile Music Contents was mainly focused on Industry factors & enterprise factors like Technology. This study is not only focused on Technology factors, but also Customer & System factors like TAM of original, and also, this study first tried to find the Mobile Internet medium's customer purchase by each property's Mobile Music Contents from assorting the Mobile music Contents property and defining them. So to speak of this study have tried to concretely verify the factors of purchase. And also, I proposed an transformated model, and added independent variable factors, 'distinction', 'speed of system', 'speed of network', 'a career of use', 'amount of use', 'preservation', 'customization', 'information', 'confidence', 'omni presentation', 'potential possibility of reproduce'. By applying TAM this study has measured how the product property. user property, and system property causes effect to customer purchase of Mobile Music Contents. In results, First, success 8 factors were determined to be the purchase of 'Ringtone'. Second, 8 factors were determined to be the purchase of 'Ring-Back tone', but, 'The use of convenience' was not influenced 'Intention of Purchase'. Third, 6 factors were determined to be the purchase of 'Full Track Download of Music'. At the Conclusion this study presented a scheme that these study results could be applied in actual company and academic world.

  • PDF

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

A study on the Frequency Analysis Function of the Auricle Using A Notch Filter

  • Park, Dong-Cheol
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.241-255
    • /
    • 2021
  • The human auricle is the first part to receive sound from the outside. In this part, the frequency range of human recognizable form is divided and organized. In this study, we propose modeling by applying a single sound source to the surface of the human auricle. This means that when the sound pressure of a low frequency (low frequency) sound enters the pinna, the impedance felt at the tip of a part of the non-linear surface of the pinna is mainly due to the tensile force at the end of the part of the non-linear surface of the pinna. By expressing the situation of moving at a very small speed, the characteristic impedance of the pinna was confirmed to be negative infinity, and it was also confirmed that the speed at the tip of a part of the non-linear surface of the pinna was 0 in the anti-resonance state. It was found that the wave propagation phenomenon that determines the characteristics of the filter is determined by how large the wavelength, kL, is compared to the length of the tip of a part of the non-straight surface of the pinna. Humans first receive sounds from outside through their ears. The auricle is non-linear and has a curved shape, and it is known that it analyzes frequencies while receiving external sounds. The human ear has an audible frequency range of 20Hz - 20,000Hz. Through the study, we applied the characteristics of the notch filter to hypothesize that the human audible frequency range is separated from the auricle, and applied filter theory to analyze it, and as a result, meaningful results were obtained. The curved part and the inner part of the auricle function as a trumpet, collecting sounds, and at the same time amplifying the weak sound of a specific band. The point was found and the shape of the envelope detected in the auricle was found. Selectivity for selecting sounds coming from the outside is the formula of the pinna that implements the function of Q. The function of distinguishing human-recognizable sound from the pinna from low to high through frequency analysis is performed in the pinna, and the 2-3kHz area, where human hearing threshold is the most sensitive, is also the acoustic impedance of the most recessed area of the pinna. It can be seen that starting from.

The Design of IAPP Server for Secure Handoff of wireless LAN Terminal (무선랜 단말의 안전한 핸드오프를 위한 Diameter IAPP서버의 설계)

  • 함영환;정병호;정교일;서창호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12C
    • /
    • pp.1258-1267
    • /
    • 2003
  • As the need for stable and high speed wireless Internet service Brows, the wireless LAN service provider hurries to preempt wireless LAN service market. IAPP(InterAccess Point protocol) is defined to be able to provide a secure handoff mechanism of wireless LAN terminal information between AP(Access Point)s, and the related IEEE standard is IEEE 802.11f. For the secure handoff of wireless LAN terminal, it is necessary to transfer terminal's authentication & accounting information securely from old AP to new AP IEEE 802.11f recommends RADIUS server as IAPP server which authenticates AP and provides information for secure channel between APs. This paper proposes IAPP server using Diameter protocol to overcome the limit of RADIUS sewer, and describes about the interaction between server components and integration method with the current IAPP client system.